Search Results for Security. - Narrowed by: 2013 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092013$0025092013$0026ps$003d300$0026isd$003dtrue? 2025-02-27T03:05:05Z LTE security ent://SD_ILS/0/SD_ILS:299540 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Forsberg, Dan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://lib.myilibrary.com?id=449976">Connect to MyiLibrary resource.</a> <a href="http://proquest.safaribooksonline.com/?fpi=9781118380659">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118380642">http://dx.doi.org/10.1002/9781118380642</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=51195">http://www.books24x7.com/marc.asp?bookid=51195</a> ebrary <a href="http://site.ebrary.com/id/10657818">http://site.ebrary.com/id/10657818</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security consulting ent://SD_ILS/0/SD_ILS:149071 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Sennewald, Charles A., 1931-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123985002">http://www.sciencedirect.com/science/book/9780123985002</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Elementary information security ent://SD_ILS/0/SD_ILS:271272 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Smith, Richard E.<br/>Preferred Shelf Number&#160;QA76.9.A25 S652 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Introduction to security ent://SD_ILS/0/SD_ILS:270130 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Fischer, Robert J.&#160;Halibozek, Edward P.&#160;Walters, David, 1963-<br/>Preferred Shelf Number&#160;HV8290 G74 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Pro Spring Security ent://SD_ILS/0/SD_ILS:330643 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Scarioni, Carlo. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330643.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-4819-4">http://dx.doi.org/10.1007/978-1-4302-4819-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automated Security Management ent://SD_ILS/0/SD_ILS:332865 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Al-Shaer, Ehab. editor.&#160;Ou, Xinming. editor.&#160;Xie, Geoffrey. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332865.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-01433-3">http://dx.doi.org/10.1007/978-3-319-01433-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289151 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:287123 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290320 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security studies an introduction ent://SD_ILS/0/SD_ILS:261557 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Williams, Paul, 1975-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203122570">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security for managers ent://SD_ILS/0/SD_ILS:516570 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Workman, Michael D., 1957-.&#160;Phelps, Daniel C.&#160;Gathegi, John N.<br/>Preferred Shelf Number&#160;HF5548.37 W67 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Advanced Sensors for Safety and Security ent://SD_ILS/0/SD_ILS:336346 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Vaseashta, Ashok. editor.&#160;Khudaverdyan, Surik. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336346.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-7003-4">http://dx.doi.org/10.1007/978-94-007-7003-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Environmental Security in the Arctic Ocean ent://SD_ILS/0/SD_ILS:335805 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Berkman, Paul Arthur. editor.&#160;Vylegzhanin, Alexander N. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335805.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-4713-5">http://dx.doi.org/10.1007/978-94-007-4713-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding emerging security challenges threats and opportunities ent://SD_ILS/0/SD_ILS:261683 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Swain, Ashok.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203105634">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Routledge handbook of European security ent://SD_ILS/0/SD_ILS:261672 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Biscop, Sven.&#160;Whitman, Richard G.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203098417">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in 21st century Europe ent://SD_ILS/0/SD_ILS:389609 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Cottey, Andrew.<br/>Preferred Shelf Number&#160;UA646 C713 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Privacy and Security for Cloud Computing ent://SD_ILS/0/SD_ILS:330926 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Pearson, Siani. editor.&#160;Yee, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330926.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4189-1">http://dx.doi.org/10.1007/978-1-4471-4189-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global Energy Policy and Security ent://SD_ILS/0/SD_ILS:331185 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Leal Filho, Walter. editor.&#160;Voudouris, Vlasios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331185.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-5286-6">http://dx.doi.org/10.1007/978-1-4471-5286-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Wireless Implantable Medical Devices ent://SD_ILS/0/SD_ILS:332220 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Hei, Xiali. author.&#160;Du, Xiaojiang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332220.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-7153-0">http://dx.doi.org/10.1007/978-1-4614-7153-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Assessment in Vehicular Networks ent://SD_ILS/0/SD_ILS:332479 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Du, Suguo. author.&#160;Zhu, Haojin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332479.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-9357-0">http://dx.doi.org/10.1007/978-1-4614-9357-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> From Environmental to Comprehensive Security ent://SD_ILS/0/SD_ILS:332789 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Westing, Arthur H. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332789.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-00687-1">http://dx.doi.org/10.1007/978-3-319-00687-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mining Social Networks and Security Informatics ent://SD_ILS/0/SD_ILS:336224 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;&Ouml;zyer, Tansel. editor.&#160;Erdem, Zeki. editor.&#160;Rokne, Jon. editor.&#160;Khoury, Suheil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336224.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-6359-3">http://dx.doi.org/10.1007/978-94-007-6359-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of SCADA/control systems security ent://SD_ILS/0/SD_ILS:288155 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Radvanovsky, Robert.&#160;Brodsky, Jacob.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466502277">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Supply chain security a comprehensive approach ent://SD_ILS/0/SD_ILS:288156 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Arway, Arthur G.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466511903">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The complete guide to physical security ent://SD_ILS/0/SD_ILS:290667 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Baker, Paul, 1958-&#160;Benny, Daniel J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420099645">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical infrastructure system security and resiliency ent://SD_ILS/0/SD_ILS:291727 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Biringer, Betty E., 1952-&#160;Vugrin, Eric D.&#160;Warren, Drake E.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466557512">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Personnel protection: aircraft security proven practices ent://SD_ILS/0/SD_ILS:306644 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Miller, Jerome.&#160;Jones, Radford.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170049">http://www.sciencedirect.com/science/book/9780124170049</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Expert Oracle Application Express Security ent://SD_ILS/0/SD_ILS:330631 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Spendolini, Scott. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330631.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-4732-6">http://dx.doi.org/10.1007/978-1-4302-4732-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Computer Network Security ent://SD_ILS/0/SD_ILS:331005 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Kizza, Joseph Migga. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331005.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4543-1">http://dx.doi.org/10.1007/978-1-4471-4543-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Iris Biometrics From Segmentation to Template Security ent://SD_ILS/0/SD_ILS:331810 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Rathgeb, Christian. author.&#160;Uhl, Andreas. author.&#160;Wild, Peter. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331810.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5571-4">http://dx.doi.org/10.1007/978-1-4614-5571-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and the Networked Society ent://SD_ILS/0/SD_ILS:332915 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Gregory, Mark A. author.&#160;Glance, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332915.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02390-8">http://dx.doi.org/10.1007/978-3-319-02390-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Network Security Theories and Applications ent://SD_ILS/0/SD_ILS:334222 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Chen, Lei. author.&#160;Ji, Jiahuang. author.&#160;Zhang, Zihong. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334222.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36511-9">http://dx.doi.org/10.1007/978-3-642-36511-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Research on Industrial Security Theory ent://SD_ILS/0/SD_ILS:334329 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Li, Menggang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334329.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36952-0">http://dx.doi.org/10.1007/978-3-642-36952-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT Convergence and Security 2012 ent://SD_ILS/0/SD_ILS:336088 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Kim, Kuinam J. editor.&#160;Chung, Kyung-Yong. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336088.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-5860-5">http://dx.doi.org/10.1007/978-94-007-5860-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Personnel protection security personnel, proven practices ent://SD_ILS/0/SD_ILS:306635 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Miller, Jerome, author.&#160;Jones, Radford, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172296">http://www.sciencedirect.com/science/book/9780124172296</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security and IT infrastructure protection ent://SD_ILS/0/SD_ILS:306691 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166813">http://www.sciencedirect.com/science/book/9780124166813</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Biometrics ent://SD_ILS/0/SD_ILS:331177 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Campisi, Patrizio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331177.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-5230-9">http://dx.doi.org/10.1007/978-1-4471-5230-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Social Networks ent://SD_ILS/0/SD_ILS:331435 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Altshuler, Yaniv. editor.&#160;Elovici, Yuval. editor.&#160;Cremers, Armin B. editor.&#160;Aharony, Nadav. editor.&#160;Pentland, Alex. editor.<br/>Preferred Shelf Number&#160;ONLINE(331435.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-4139-7">http://dx.doi.org/10.1007/978-1-4614-4139-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Android security attacks and defenses ent://SD_ILS/0/SD_ILS:287193 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Misra, Anmol.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439896471">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and modernity in Southeast Asia ent://SD_ILS/0/SD_ILS:341060 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Rappa, Antonio L.&#160;Gale Group.<br/>Preferred Shelf Number&#160;ONLINE(341060.1)<br/>Electronic Access&#160;<a href="http://find.galegroup.com/openurl/openurl?url_ver=Z39.88-2004&url_ctx_fmt=info:ofi/fmt:kev:mtx:ctx&req_dat=info:sid/gale:ugnid:hu_tr&res_id=info:sid/gale:GVRL&ctx_enc=info:ofi:enc:UTF-8&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft_id=info:sid/gale:bmcode:recid/A15M">Available for Hacettepe University via Gale Virtual Reference Library. Click here to access</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia security watermarking, steganography, and forensics ent://SD_ILS/0/SD_ILS:287151 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Shih, Frank Y.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439873328">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> UTM security with Fortinet Mastering FortiOS ent://SD_ILS/0/SD_ILS:146934 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Tam, Kenneth.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497473">http://www.sciencedirect.com/science/book/9781597497473</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Maritime security in Southeast Asia ent://SD_ILS/0/SD_ILS:239577 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Bradford, John F.&#160;National Bureau of Asian Research (U.S.)&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781939131133/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Nontraditional security challenges in South Asia ent://SD_ILS/0/SD_ILS:239579 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Bhuiya, Abbas.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781939131119/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Resilience, Security &amp; Risk in Transport ent://SD_ILS/0/SD_ILS:509892 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;IET, ed.<br/>Preferred Shelf Number&#160;XX(509892.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/PERRSR3E">http://dx.doi.org/10.1049/PERRSR3E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Crime-terror alliances and the state ethnonationalist and Islamist challenges to regional security ent://SD_ILS/0/SD_ILS:258677 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Grigorova, Lyubov, 1962-&#160;Gurr, Ted Robert, 1936-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203077504">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Non-traditional security issues in North Korea ent://SD_ILS/0/SD_ILS:241190 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Park, Kyung-Ae, 1955- editor of compilation.&#160;University of Hawaii at Manoa. Center for Korean Studies.&#160;Project Muse.&#160;International Conference on Non-Traditional Security Issues in North Korea (2010 : Seoul, Korea)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780824837822/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Routledge handbook of religion and security ent://SD_ILS/0/SD_ILS:259601 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Seiple, Chris.&#160;Hoover, Dennis.&#160;Otis, Pauletta, 1942-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203102312">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Mobile Social Networks ent://SD_ILS/0/SD_ILS:332451 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Liang, Xiaohui. author.&#160;Lu, Rongxing. author.&#160;Lin, Xiaodong. author.&#160;Shen, Xuemin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332451.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-8857-6">http://dx.doi.org/10.1007/978-1-4614-8857-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy Preserving in Social Networks ent://SD_ILS/0/SD_ILS:335299 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Chbeir, Richard. editor.&#160;Al Bouna, Bechara. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335299.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-7091-0894-9">http://dx.doi.org/10.1007/978-3-7091-0894-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Economics of Information Security and Privacy ent://SD_ILS/0/SD_ILS:334810 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;B&ouml;hme, Rainer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334810.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39498-0">http://dx.doi.org/10.1007/978-3-642-39498-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> International Intellectual Property Law and Human Security ent://SD_ILS/0/SD_ILS:335678 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Ramcharan, Robin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335678.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-90-6704-900-9">http://dx.doi.org/10.1007/978-90-6704-900-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical infrastructure homeland security and emergency preparedness ent://SD_ILS/0/SD_ILS:288161 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Radvanovsky, Robert.&#160;McDougall, Allan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466503465">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Performance evaluation and attribution of security portfolios ent://SD_ILS/0/SD_ILS:306651 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Fischer, Bernd R.&#160;Wermers, Russ.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780127444833">http://www.sciencedirect.com/science/book/9780127444833</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The economy-security nexus in Northeast Asia ent://SD_ILS/0/SD_ILS:260578 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Pempel, T. J., 1942-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203100080">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Embedded Multimedia Security Systems Algorithms and Architectures ent://SD_ILS/0/SD_ILS:330984 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Pande, Amit. author.&#160;Zambreno, Joseph. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330984.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4459-5">http://dx.doi.org/10.1007/978-1-4471-4459-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Security Breaches and Privacy in Europe ent://SD_ILS/0/SD_ILS:331220 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Wong, Rebecca. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331220.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-5586-7">http://dx.doi.org/10.1007/978-1-4471-5586-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PBX Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:331279 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Androulidakis, Iosif I. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331279.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1656-2">http://dx.doi.org/10.1007/978-1-4614-1656-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Economics of Information Security and Privacy III ent://SD_ILS/0/SD_ILS:331294 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Schneier, Bruce. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331294.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1981-5">http://dx.doi.org/10.1007/978-1-4614-1981-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Operations Research for Homeland Security ent://SD_ILS/0/SD_ILS:331730 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Herrmann, Jeffrey W. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331730.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5278-2">http://dx.doi.org/10.1007/978-1-4614-5278-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Personnel protection executive worksite security, proven practices ent://SD_ILS/0/SD_ILS:306638 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Miller, Jerome.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172289">http://www.sciencedirect.com/science/book/9780124172289</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security community in South Asia India-Pakistan ent://SD_ILS/0/SD_ILS:261451 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Pervez, Muhammad Shoaib.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203106266">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Business data communications : infrastructure, networking and security ent://SD_ILS/0/SD_ILS:268322 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Stallings, William.&#160;Case, Thomas.<br/>Preferred Shelf Number&#160;HF5548.2 S7728 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Human security and climate change in Southeast Asia managing risk and resilience ent://SD_ILS/0/SD_ILS:261511 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Elliott, Lorraine M.&#160;Anthony, Mely Caballero.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203107775">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> National, European and human security from co-existence to convergence ent://SD_ILS/0/SD_ILS:260687 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Martin, Mary, 1957-&#160;Kaldor, Mary.&#160;Serra, Narc&iacute;s.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203112069">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human and Water Security in Israel and Jordan ent://SD_ILS/0/SD_ILS:333228 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Sch&auml;fer, Philip Jan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333228.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29299-6">http://dx.doi.org/10.1007/978-3-642-29299-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> FISMA and the risk management framework the new practice of federal cyber security ent://SD_ILS/0/SD_ILS:145936 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Gantz, Stephen D.&#160;Philpott, Daniel R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496414">http://www.sciencedirect.com/science/book/9781597496414</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The NSA report liberty and security in a changing world ent://SD_ILS/0/SD_ILS:324150 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Swire, Peter P., group member.&#160;Sunstein, Cass R., group member.&#160;Stone, Geoffrey R., group member.&#160;Morell, Michael J., group member.&#160;Clarke, Richard A. (Richard Alan), 1951-, group member.<br/>Preferred Shelf Number&#160;ONLINE(324150.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781400851270/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> US domestic and international regimes of security pacifying the globe, securing the homeland ent://SD_ILS/0/SD_ILS:258628 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Kienscherf, Markus, 1979-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203081068">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Zion's dilemmas : how Israel makes national security policy ent://SD_ILS/0/SD_ILS:376974 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Freilich, Charles D. (Charles David)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.jstor.org/stable/10.7591/j.cttq42h7">http://www.jstor.org/stable/10.7591/j.cttq42h7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Environmental Security Assessment and Management of Obsolete Pesticides in Southeast Europe ent://SD_ILS/0/SD_ILS:336248 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Simeonov, Lubomir I. editor.&#160;Macaev, Fliur Z. editor.&#160;Simeonova, Biana G. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336248.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-6461-3">http://dx.doi.org/10.1007/978-94-007-6461-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> China in the UN Security Council decision-making on Iraq conflicting understandings, competing preferences ent://SD_ILS/0/SD_ILS:261635 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Yang, Suzanne Xiao.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203113615">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> EU-Russian border security challenges, (mis)perceptions, and responses ent://SD_ILS/0/SD_ILS:258781 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Golunov, S. V., 1973-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203106969">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The McGraw-Hill homeland security handbook strategic guidance for a coordinated approach to effective security and emergency management ent://SD_ILS/0/SD_ILS:292977 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Kamien, David G.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/mcgrawhill-homeland-security-handbook-strategic-guidance-for-coordinated-approach-to-effective-emergency-management-second-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer ent://SD_ILS/0/SD_ILS:62188 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Davies, Donald Watts, 1924-&#160;Price, W. L., ort.yaz.<br/>Preferred Shelf Number&#160;TK 5105 D43 1989<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> The memoirs and memorials of Jacques de Couture security, trade and society in 16th and 17th-century Southeast Asia ent://SD_ILS/0/SD_ILS:277903 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Coutre, Jacques de, 1577-1640, author.&#160;Coutre, Jacques de, 1577-1640. Vida de Jacques de Couture. English.&#160;Roy, Roopanjali, translator.&#160;Borschberg, Peter, editor, writer of added commentary.&#160;Project Muse, distributor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9789971696832/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The state and security in Mexico transformation and crisis in regional perspective ent://SD_ILS/0/SD_ILS:258662 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Bow, Brian J.&#160;Santa Cruz, Arturo.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203098585">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> International responsibility and grave humanitarian crises collective provision for human security ent://SD_ILS/0/SD_ILS:258670 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Peltonen, Hannes, 1978-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203093764">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Militarism and international relations political economy, security, theory ent://SD_ILS/0/SD_ILS:258692 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Stavrianakis, Anna.&#160;Selby, Jan, 1972-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203101476">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical approaches to security an introduction to theories and methods ent://SD_ILS/0/SD_ILS:259610 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Shepherd, Laura J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203076873">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> U.S.-Venezuela relations since the 1990s coping with midlevel security threats ent://SD_ILS/0/SD_ILS:262143 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Corrales, Javier, 1966-&#160;Romero, Carlos A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203800515">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The other welfare supplemental security income and U.S. social policy ent://SD_ILS/0/SD_ILS:277586 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Berkowitz, Edward D.&#160;DeWitt, Larry, 1949-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780801467332/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Strategic thinking in 3D a guide for national security, foreign policy, and business professionals ent://SD_ILS/0/SD_ILS:277710 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Harrison, Ross, 1953-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781597978071/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Latin America in the post-Ch&aacute;vez era the security threat to the United States ent://SD_ILS/0/SD_ILS:277711 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Fleischman, Luis, 1959-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781612346021/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Peace in Turkey 2023 : the question of human security and conflict transformation ent://SD_ILS/0/SD_ILS:363151 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Jacoby, Tim, 1969- author.&#160;&Ouml;zerdem, Alpaslan.<br/>Preferred Shelf Number&#160;HM1126 J33 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security : politics, humanity, and the philology of care ent://SD_ILS/0/SD_ILS:377140 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Hamilton, John T.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.jstor.org/stable/10.2307/j.ctt24hqtb">http://www.jstor.org/stable/10.2307/j.ctt24hqtb</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Disclosure of Security Vulnerabilities Legal and Ethical Issues ent://SD_ILS/0/SD_ILS:331114 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Maurushat, Alana. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331114.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-5004-6">http://dx.doi.org/10.1007/978-1-4471-5004-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings ent://SD_ILS/0/SD_ILS:332957 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Abdalla, Michel. editor.&#160;Nita-Rotaru, Cristina. editor.&#160;Dahab, Ricardo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332957.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02937-5">http://dx.doi.org/10.1007/978-3-319-02937-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stabilization, Safety, and Security of Distributed Systems 15th International Symposium, SSS 2013, Osaka, Japan, November 13-16, 2013. Proceedings ent://SD_ILS/0/SD_ILS:332964 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Higashino, Teruo. editor.&#160;Katayama, Yoshiaki. editor.&#160;Masuzawa, Toshimitsu. editor.&#160;Potop-Butucaru, Maria. editor.&#160;Yamashita, Masafumi. editor.<br/>Preferred Shelf Number&#160;ONLINE(332964.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-03089-0">http://dx.doi.org/10.1007/978-3-319-03089-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace Safety and Security 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings ent://SD_ILS/0/SD_ILS:332984 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Wang, Guojun. editor.&#160;Ray, Indrakshi. editor.&#160;Feng, Dengguo. editor.&#160;Rajarajan, Muttukrishnan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332984.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-03584-0">http://dx.doi.org/10.1007/978-3-319-03584-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings ent://SD_ILS/0/SD_ILS:332941 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Qing, Sihan. editor.&#160;Zhou, Jianying. editor.&#160;Liu, Dongmei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332941.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02726-5">http://dx.doi.org/10.1007/978-3-319-02726-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management and Autonomous Spontaneous Security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334078 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Pietro, Roberto. editor.&#160;Herranz, Javier. editor.&#160;Damiani, Ernesto. editor.&#160;State, Radu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334078.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35890-6">http://dx.doi.org/10.1007/978-3-642-35890-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radio Frequency Identification. Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334132 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Hoepman, Jaap-Henk. editor.&#160;Verbauwhede, Ingrid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334132.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36140-1">http://dx.doi.org/10.1007/978-3-642-36140-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334365 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Garcia-Alfaro, Joaquin. editor.&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Cuppens-Boulahia, Nora. editor.&#160;Miri, Ali. editor.&#160;Tawbi, Nadia. editor.<br/>Preferred Shelf Number&#160;ONLINE(334365.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37119-6">http://dx.doi.org/10.1007/978-3-642-37119-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334613 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Kuty&#322;owski, Miros&#322;aw. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334613.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38519-3">http://dx.doi.org/10.1007/978-3-642-38519-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I ent://SD_ILS/0/SD_ILS:335157 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Sako, Kazue. editor.&#160;Sarkar, Palash. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335157.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II ent://SD_ILS/0/SD_ILS:335160 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Sako, Kazue. editor.&#160;Sarkar, Palash. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335160.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT Security Risk Management Perceived IT Security Risks in the Context of Cloud Computing ent://SD_ILS/0/SD_ILS:335258 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Ackermann, Tobias. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335258.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-658-01115-4">http://dx.doi.org/10.1007/978-3-658-01115-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings ent://SD_ILS/0/SD_ILS:335098 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Sakiyama, Kazuo. editor.&#160;Terada, Masayuki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335098.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems: Development, Learning, Security 6th SIGSAND/PLAIS EuroSymposium 2013, Gda&#324;sk, Poland, September 26, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335020 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Wrycza, Stanis&#322;aw. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335020.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40855-7">http://dx.doi.org/10.1007/978-3-642-40855-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Impact of Private Actors on Security Governance An Analysis based on German ISR Capabilities for ISAF ent://SD_ILS/0/SD_ILS:335280 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Westermeyer, Gloria. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335280.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-658-02230-3">http://dx.doi.org/10.1007/978-3-658-02230-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multilayered Security and Privacy Protection in Car-to-X Networks Solutions from Application down to Physical Layer ent://SD_ILS/0/SD_ILS:335287 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;St&uuml;bing, Hagen. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335287.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-658-02531-1">http://dx.doi.org/10.1007/978-3-658-02531-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ISSE 2013 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2013 Conference ent://SD_ILS/0/SD_ILS:335292 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Reimer, Helmut. editor.&#160;Pohlmann, Norbert. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335292.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-658-03371-2">http://dx.doi.org/10.1007/978-3-658-03371-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructure Security 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335107 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Bologna, Sandro. editor.&#160;H&auml;mmerli, Bernhard. editor.&#160;Gritzalis, Dimitris. editor.&#160;Wolthusen, Stephen. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335107.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41476-3">http://dx.doi.org/10.1007/978-3-642-41476-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335110 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;H&auml;mmerli, Bernhard M. editor.&#160;Kalstad Svendsen, Nils. editor.&#160;Lopez, Javier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335110.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41485-5">http://dx.doi.org/10.1007/978-3-642-41485-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334616 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Cavallaro, Lorenzo. editor.&#160;Gollmann, Dieter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334616.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38530-8">http://dx.doi.org/10.1007/978-3-642-38530-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimization and Security Challenges in Smart Power Grids ent://SD_ILS/0/SD_ILS:334543 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Pappu, Vijay. editor.&#160;Carvalho, Marco. editor.&#160;Pardalos, Panos. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334543.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38134-8">http://dx.doi.org/10.1007/978-3-642-38134-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334720 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Boyd, Colin. editor.&#160;Simpson, Leonie. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334720.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXVII 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334767 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Wang, Lingyu. editor.&#160;Shafiq, Basit. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334767.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39256-6">http://dx.doi.org/10.1007/978-3-642-39256-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334836 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Wang, G. Alan. editor.&#160;Zheng, Xiaolong. editor.&#160;Chau, Michael. editor.&#160;Chen, Hsinchun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334836.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39693-9">http://dx.doi.org/10.1007/978-3-642-39693-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334863 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Sadeghi, Ahmad-Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334863.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39884-1">http://dx.doi.org/10.1007/978-3-642-39884-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2013 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334909 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Crampton, Jason. editor.&#160;Jajodia, Sushil. editor.&#160;Mayes, Keith. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334909.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40203-6">http://dx.doi.org/10.1007/978-3-642-40203-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy, and Security in Digital Business 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334930 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Furnell, Steven. editor.&#160;Lambrinoudakis, Costas. editor.&#160;Lopez, Javier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334930.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40343-9">http://dx.doi.org/10.1007/978-3-642-40343-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Lightweight Cryptography for Security and Privacy Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334938 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Avoine, Gildas. editor.&#160;Kara, Orhun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334938.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40392-7">http://dx.doi.org/10.1007/978-3-642-40392-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Computing and Communications International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334972 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Thampi, Sabu M. editor.&#160;Atrey, Pradeep K. editor.&#160;Fan, Chun-I. editor.&#160;Perez, Gregorio Martinez. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334972.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40576-1">http://dx.doi.org/10.1007/978-3-642-40576-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Engineering and Intelligence Informatics CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334975 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Cuzzocrea, Alfredo. editor.&#160;Kittl, Christian. editor.&#160;Simos, Dimitris E. editor.&#160;Weippl, Edgar. editor.&#160;Xu, Lida. editor.<br/>Preferred Shelf Number&#160;ONLINE(334975.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40588-4">http://dx.doi.org/10.1007/978-3-642-40588-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Security of Information and Communication Networks First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334976 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Awad, Ali Ismail. editor.&#160;Hassanien, Aboul Ella. editor.&#160;Baba, Kensuke. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334976.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40597-6">http://dx.doi.org/10.1007/978-3-642-40597-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasures ent://SD_ILS/0/SD_ILS:334982 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Haataja, Keijo. author.&#160;Hypp&ouml;nen, Konstantin. author.&#160;Pasanen, Sanna. author.&#160;Toivanen, Pekka. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334982.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40646-1">http://dx.doi.org/10.1007/978-3-642-40646-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335002 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Decker, Bart. editor.&#160;Dittmann, Jana. editor.&#160;Kraetzer, Christian. editor.&#160;Vielhauer, Claus. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335002.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40779-6">http://dx.doi.org/10.1007/978-3-642-40779-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 24-27, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335005 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Bitsch, Friedemann. editor.&#160;Guiochet, J&eacute;r&eacute;mie. editor.&#160;Ka&acirc;niche, Mohamed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335005.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40793-2">http://dx.doi.org/10.1007/978-3-642-40793-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XXI 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335142 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James. editor.&#160;Stajano, Frank. editor.&#160;Anderson, Jonathan. editor.&#160;Bonneau, Joseph. editor.<br/>Preferred Shelf Number&#160;ONLINE(335142.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41717-7">http://dx.doi.org/10.1007/978-3-642-41717-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sustainable Food Security in the Era of Local and Global Environmental Change ent://SD_ILS/0/SD_ILS:336310 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Behnassi, Mohamed. editor.&#160;Pollmann, Olaf. editor.&#160;Kissinger, Gabrielle. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336310.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-6719-5">http://dx.doi.org/10.1007/978-94-007-6719-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Climate Change and Food Security in West Asia and North Africa ent://SD_ILS/0/SD_ILS:336314 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Sivakumar, Mannava V.K. editor.&#160;Lal, Rattan. editor.&#160;Selvaraju, Ramasamy. editor.&#160;Hamdan, Ibrahim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336314.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-6751-5">http://dx.doi.org/10.1007/978-94-007-6751-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Technology Convergence Security, Robotics, Automations and Communication ent://SD_ILS/0/SD_ILS:336345 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Park, James J. (Jong Hyuk). editor.&#160;Barolli, Leonard. editor.&#160;Xhafa, Fatos. editor.&#160;Jeong, Hwa-Young. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336345.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-6996-0">http://dx.doi.org/10.1007/978-94-007-6996-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communicating climate change and energy security new methods in understanding audiences ent://SD_ILS/0/SD_ILS:344359 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Philo, Greg.&#160;Happer, Catherine, 1973-<br/>Preferred Shelf Number&#160;ONLINE(344359.1)<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203380956">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for wireless sensor networks using identity-based cryptography ent://SD_ILS/0/SD_ILS:286252 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Patil, Harsh Kupwade.&#160;Szygenda, Stephen A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439869024">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security literacy staying safe in a digital world ent://SD_ILS/0/SD_ILS:290839 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Jacobson, Douglas.&#160;Idziorek, Joseph.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439856192">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Personnel protection concepts of executive security : proven practices ent://SD_ILS/0/SD_ILS:306639 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Miller, Jerome.&#160;Jones, Radford.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170032">http://www.sciencedirect.com/science/book/9780124170032</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Aligning security services with business objectives proven practices ent://SD_ILS/0/SD_ILS:306642 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Lefler, Richard.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170087">http://www.sciencedirect.com/science/book/9780124170087</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building a security measures and metrics program proven practices ent://SD_ILS/0/SD_ILS:306643 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Campbell, George.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170070">http://www.sciencedirect.com/science/book/9780124170070</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Arctic Security in an Age of Climate Change ent://SD_ILS/0/SD_ILS:237958 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Kraska, James.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511994784">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Chinese diplomacy and the UN Security Council beyond the veto ent://SD_ILS/0/SD_ILS:260563 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Wuthnow, Joel.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203082041">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of land and water grabs in Africa foreign direct investment and food and water security ent://SD_ILS/0/SD_ILS:260672 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Allan, J. A. (John Anthony)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203110942">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> NATO's security discourse after the Cold War representing the West ent://SD_ILS/0/SD_ILS:260683 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Behnke, Andreas.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203109328">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Space policy in developing countries the search for security and development on the final frontier ent://SD_ILS/0/SD_ILS:260684 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Harding, Robert C.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203106440">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security challenges in the Euro-Med area in the 21st century Mare Nostrum ent://SD_ILS/0/SD_ILS:261520 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Calleya, Stephen C.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203085707">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Militarism and international relations : political economy, security and theory ent://SD_ILS/0/SD_ILS:269342 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Stavrianakis, Anna.&#160;Selby, Jan, 1972-<br/>Preferred Shelf Number&#160;JZ1251 M56 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Strategic intelligence management : national security imperatives and information and communications technologies ent://SD_ILS/0/SD_ILS:270363 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Akhgar, Babak.&#160;Yates, Simeon.<br/>Preferred Shelf Number&#160;TK5102.85 A44 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Effective surveillance for homeland security balancing technology and social issues ent://SD_ILS/0/SD_ILS:285319 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Flammini, Francesco.&#160;Setola, Roberto.&#160;Franceschetti, Giorgio.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439883259">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Control Your Retirement Destiny Achieving Financial Security Before the Big Transition ent://SD_ILS/0/SD_ILS:330678 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Anspach, Dana. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330678.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-5023-4">http://dx.doi.org/10.1007/978-1-4302-5023-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Freedom A Guide to Achieving Lifelong Wealth and Security ent://SD_ILS/0/SD_ILS:330612 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Advani, Reuben. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330612.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-4540-7">http://dx.doi.org/10.1007/978-1-4302-4540-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing Risk and Information Security Protect to Enable ent://SD_ILS/0/SD_ILS:330694 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Harkins, Malcolm. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330694.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-5114-9">http://dx.doi.org/10.1007/978-1-4302-5114-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pro ASP.NET Web API Security Securing ASP.NET Web API ent://SD_ILS/0/SD_ILS:330706 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Lakshmiraghavan, Badrinarayanan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330706.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-5783-7">http://dx.doi.org/10.1007/978-1-4302-5783-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Linking Trade and Security Evolving Institutions and Strategies in Asia, Europe, and the United States ent://SD_ILS/0/SD_ILS:331581 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Aggarwal, Vinod K. editor.&#160;Govella, Kristi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331581.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-4765-8">http://dx.doi.org/10.1007/978-1-4614-4765-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Structured Peer-to-Peer Systems Fundamentals of Hierarchical Organization, Routing, Scaling, and Security ent://SD_ILS/0/SD_ILS:331785 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Korzun, Dmitry. author.&#160;Gurtov, Andrei. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331785.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5483-0">http://dx.doi.org/10.1007/978-1-4614-5483-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced DPA Theory and Practice Towards the Security Limits of Secure Embedded Circuits ent://SD_ILS/0/SD_ILS:332116 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Peeters, Eric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332116.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-6783-0">http://dx.doi.org/10.1007/978-1-4614-6783-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Deterrence and IT Protection for Critical Infrastructures ent://SD_ILS/0/SD_ILS:332909 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Martellini, Maurizio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332909.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02279-6">http://dx.doi.org/10.1007/978-3-319-02279-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:333008 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Luiijf, Eric. editor.&#160;Hartel, Pieter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333008.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-03964-0">http://dx.doi.org/10.1007/978-3-319-03964-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:333021 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Zia, Tanveer. editor.&#160;Zomaya, Albert. editor.&#160;Varadharajan, Vijay. editor.&#160;Mao, Morley. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333021.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-04283-1">http://dx.doi.org/10.1007/978-3-319-04283-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings ent://SD_ILS/0/SD_ILS:332947 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Das, Sajal K. editor.&#160;Nita-Rotaru, Cristina. editor.&#160;Kantarcioglu, Murat. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332947.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02786-9">http://dx.doi.org/10.1007/978-3-319-02786-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Technologies for Intelligent Systems of National Border Security ent://SD_ILS/0/SD_ILS:333466 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Nawrat, Aleksander. editor.&#160;Simek, Krzysztof. editor.&#160;&#346;wierniak, Andrzej. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333466.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31665-4">http://dx.doi.org/10.1007/978-3-642-31665-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Supply Chain Safety Management Security and Robustness in Logistics ent://SD_ILS/0/SD_ILS:333513 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Essig, Michael. editor.&#160;H&uuml;lsmann, Michael. editor.&#160;Kern, Eva-Maria. editor.&#160;Klein-Schmeink, Stephan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333513.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32021-7">http://dx.doi.org/10.1007/978-3-642-32021-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> One Health: The Human-Animal-Environment Interfaces in Emerging Infectious Diseases Food Safety and Security, and International and National Plans for Implementation of One Health Activities ent://SD_ILS/0/SD_ILS:334065 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Mackenzie, John S. editor.&#160;Jeggo, Martyn. editor.&#160;Daszak, Peter. editor.&#160;Richt, Juergen A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334065.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35846-3">http://dx.doi.org/10.1007/978-3-642-35846-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Networks and Security Issues, Challenges and Research Trends ent://SD_ILS/0/SD_ILS:334140 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Khan, Shafiullah. editor.&#160;Khan Pathan, Al-Sakib. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334140.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36169-2">http://dx.doi.org/10.1007/978-3-642-36169-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334145 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James A. editor.&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334145.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36213-2">http://dx.doi.org/10.1007/978-3-642-36213-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of Security and Trust Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334305 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Basin, David. editor.&#160;Mitchell, John C. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334305.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36830-1">http://dx.doi.org/10.1007/978-3-642-36830-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334316 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Keromytis, Angelos D. editor.&#160;Pietro, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334316.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36883-7">http://dx.doi.org/10.1007/978-3-642-36883-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology &ndash; ICISC 2012 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334470 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Kwon, Taekyoung. editor.&#160;Lee, Mun-Kyu. editor.&#160;Kwon, Daesung. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334470.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37682-5">http://dx.doi.org/10.1007/978-3-642-37682-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bringing a corporate security culture to life proven practices ent://SD_ILS/0/SD_ILS:306637 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Cheviot, Peter.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172319">http://www.sciencedirect.com/science/book/9780124172319</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The benefits and security risks of web-based applications for business trend report ent://SD_ILS/0/SD_ILS:306640 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Kotwica, Kathleen.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170018">http://www.sciencedirect.com/science/book/9780124170018</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Corporate security organizational structure, cost of services and staffing benchmark research report / Bob Hayes, Greg Kane, Kathleen Kotwica. ent://SD_ILS/0/SD_ILS:306647 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Hayes, Bob E., 1963-&#160;Kane, Greg.&#160;Kotwica, Kathleen.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170025">http://www.sciencedirect.com/science/book/9780124170025</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Food Security in Australia Challenges and Prospects for the Future ent://SD_ILS/0/SD_ILS:331518 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Farmar-Bowers, Quentin. editor.&#160;Higgins, Vaughan. editor.&#160;Millar, Joanne. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331518.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-4484-8">http://dx.doi.org/10.1007/978-1-4614-4484-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mound Centers and Seed Security A Comparative Analysis of Botanical Assemblages from Middle Woodland Sites in the Lower Illinois Valley ent://SD_ILS/0/SD_ILS:331900 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Mueller, Natalie G. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331900.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5921-7">http://dx.doi.org/10.1007/978-1-4614-5921-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> State Control over Private Military and Security Companies in Armed Conflict ent://SD_ILS/0/SD_ILS:236868 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Tonkin, Hannah.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511993367">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for the Pope in a violent and rebellious world ent://SD_ILS/0/SD_ILS:240481 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Nyenyembe, Jordan, 1959-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9789956790142/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Non-traditional security in Asia issues, challenges, and framework for action ent://SD_ILS/0/SD_ILS:240695 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Anthony, Mely Caballero.&#160;Institute of Southeast Asian Studies.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9789814414609/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building a people-oriented security community the ASEAN way ent://SD_ILS/0/SD_ILS:261449 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Collins, Alan, 1967-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203104842">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Water management, food security and sustainable agriculture in developing countries ent://SD_ILS/0/SD_ILS:261499 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Dinesh Kumar, M.&#160;Sivamohan, M. V. K.&#160;Bassi, Nitin.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203104873">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Reforming the UN Security Council membership the illusion of representativeness ent://SD_ILS/0/SD_ILS:261509 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Hassler, Sabine.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203078334">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> China's challenges to human security foreign relations and global implications ent://SD_ILS/0/SD_ILS:261674 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Wu, Guoguang.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203110911">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cultural messaging in the U.S. war on terrorism a performative approach to security ent://SD_ILS/0/SD_ILS:279738 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Sylvia, Polly, 1977-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=520620">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=520620</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data security, data mining and data management : technologies and challenges ent://SD_ILS/0/SD_ILS:280914 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;O'Byrne, Serge, editor of compilation.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=570680">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=570680</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building a framework of security for Southeast Europe and the Black Sea region a challenge facing NATO ent://SD_ILS/0/SD_ILS:281154 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Peterson, James W. (James Walter), 1945- author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=577406">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=577406</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security policy development for compliance ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:288173 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Williams, Barry L.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466580596">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> General aviation security aircraft, hangars, fixed-base operations, flight schools, and airports ent://SD_ILS/0/SD_ILS:289958 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Benny, Daniel J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466510883">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PRAGMATIC security metrics applying metametrics to information security ent://SD_ILS/0/SD_ILS:289974 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Brotby, W. Krag.&#160;Hinson, Gary.&#160;Kabay, Michel E.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439881538">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> North Korean nuclear operationality regional security and nonproliferation ent://SD_ILS/0/SD_ILS:322371 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Moore, Gregory J.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(322371.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781421410951/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quality, Reliability, Security and Robustness in Heterogeneous Networks 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334505 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Singh, Karan. editor.&#160;Awasthi, Amit K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334505.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37949-9">http://dx.doi.org/10.1007/978-3-642-37949-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334514 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;J&oslash;sang, Audun. editor.&#160;Samarati, Pierangela. editor.&#160;Petrocchi, Marinella. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334514.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38004-4">http://dx.doi.org/10.1007/978-3-642-38004-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Grid Security First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334518 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Cuellar, Jorge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334518.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38030-3">http://dx.doi.org/10.1007/978-3-642-38030-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334519 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Deng, Robert H. editor.&#160;Feng, Tao. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334519.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38033-4">http://dx.doi.org/10.1007/978-3-642-38033-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia Communications, Services and Security 6th International Conference, MCSS 2013, Krakow, Poland, June 6-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334621 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Dziech, Andrzej. editor.&#160;Czy&#380;ewski, Andrzej. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334621.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38559-9">http://dx.doi.org/10.1007/978-3-642-38559-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334638 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Lopez, Javier. editor.&#160;Huang, Xinyi. editor.&#160;Sandhu, Ravi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334638.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38631-2">http://dx.doi.org/10.1007/978-3-642-38631-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334707 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Jacobson, Michael. editor.&#160;Locasto, Michael. editor.&#160;Mohassel, Payman. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334707.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Management Mechanisms for the Future Internet 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334710 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Doyen, Guillaume. editor.&#160;Waldburger, Martin. editor.&#160;&#268;eleda, Pavel. editor.&#160;Sperotto, Anna. editor.&#160;Stiller, Burkhard. editor.<br/>Preferred Shelf Number&#160;ONLINE(334710.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38998-6">http://dx.doi.org/10.1007/978-3-642-38998-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy Protection in Information Processing Systems 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334755 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Janczewski, Lech J. editor.&#160;Wolfe, Henry B. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334755.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39218-4">http://dx.doi.org/10.1007/978-3-642-39218-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human Aspects of Information Security, Privacy, and Trust First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334786 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Marinos, Louis. editor.&#160;Askoxylakis, Ioannis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334786.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39345-7">http://dx.doi.org/10.1007/978-3-642-39345-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Assurance and Security Education and Training 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gon&ccedil;alves, RS, Brazil, July 27-31, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334794 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Dodge, Ronald C. editor.&#160;Futcher, Lynn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334794.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39377-8">http://dx.doi.org/10.1007/978-3-642-39377-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Availability, Reliability, and Security in Information Systems and HCI IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334958 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Cuzzocrea, Alfredo. editor.&#160;Kittl, Christian. editor.&#160;Simos, Dimitris E. editor.&#160;Weippl, Edgar. editor.&#160;Xu, Lida. editor.<br/>Preferred Shelf Number&#160;ONLINE(334958.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40511-2">http://dx.doi.org/10.1007/978-3-642-40511-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335057 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Accorsi, Rafael. editor.&#160;Ranise, Silvio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335057.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41098-7">http://dx.doi.org/10.1007/978-3-642-41098-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security and Privacy Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335073 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Felici, Massimo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335073.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41205-9">http://dx.doi.org/10.1007/978-3-642-41205-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335076 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Gierlichs, Benedikt. editor.&#160;Guilley, Sylvain. editor.&#160;Mukhopadhyay, Debdeep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335076.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41224-0">http://dx.doi.org/10.1007/978-3-642-41224-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335077 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Susilo, Willy. editor.&#160;Reyhanitabar, Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335077.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41227-1">http://dx.doi.org/10.1007/978-3-642-41227-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335088 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Adams, Andrew A. editor.&#160;Brenner, Michael. editor.&#160;Smith, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335088.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41320-9">http://dx.doi.org/10.1007/978-3-642-41320-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radio Frequency Identification Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335090 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Hutter, Michael. editor.&#160;Schmidt, J&ouml;rn-Marc. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335090.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41332-2">http://dx.doi.org/10.1007/978-3-642-41332-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Strategic Cultures in Europe Security and Defence Policies Across the Continent ent://SD_ILS/0/SD_ILS:335261 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Biehl, Heiko. editor.&#160;Giegerich, Bastian. editor.&#160;Jonas, Alexandra. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335261.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-658-01168-0">http://dx.doi.org/10.1007/978-3-658-01168-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335194 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Bagchi, Aditya. editor.&#160;Ray, Indrakshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335194.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45204-8">http://dx.doi.org/10.1007/978-3-642-45204-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber power : crime, conflict and security in cyberspace ent://SD_ILS/0/SD_ILS:342598 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Ghernaouti-H&eacute;lie, Solange, 1958- author.<br/>Preferred Shelf Number&#160;ONLINE(342598.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466573055">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> State security regimes and the right to freedom of religion and belief changes in Europe since 2001 ent://SD_ILS/0/SD_ILS:344501 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Murphy, Karen.<br/>Preferred Shelf Number&#160;ONLINE(344501.1)<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203082362">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Gender, national security, and counter-terrorism human rights perspectives ent://SD_ILS/0/SD_ILS:344502 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Satterthwaite, Margaret L.&#160;Huckerby, Jayne C.<br/>Preferred Shelf Number&#160;ONLINE(344502.1)<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203081396">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied network security monitoring collection, detection, and analysis ent://SD_ILS/0/SD_ILS:356122 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Sanders, Chris.&#160;Smith, Jason.<br/>Preferred Shelf Number&#160;ONLINE(356122.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172081">http://www.sciencedirect.com/science/book/9780124172081</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The definitive guide to complying with the HIPAA/HITECH privacy and security rules ent://SD_ILS/0/SD_ILS:287167 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Trinckes, John J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466507685">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protection, security, and safeguards practical approaches and perspectives ent://SD_ILS/0/SD_ILS:288080 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;June, Dale L.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439869543">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows networking tools the complete guide to management, troubleshooting, and security ent://SD_ILS/0/SD_ILS:291657 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Held, Gilbert, 1943-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466511071">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers ent://SD_ILS/0/SD_ILS:146917 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;O'Connor, T. J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499576">http://www.sciencedirect.com/science/book/9781597499576</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in cyber security technology, operations, and experiences ent://SD_ILS/0/SD_ILS:239591 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Hsu, D. Frank (Derbiau Frank), 1948-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780823250325/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Development, security, and aid geopolitics and geoeconomics at the U.S. Agency for International Development ent://SD_ILS/0/SD_ILS:240082 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Essex, Jamey, 1977-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780820345673/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cargo theft, loss prevention, and supply chain security ent://SD_ILS/0/SD_ILS:148926 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Burges, Dan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124160071">http://www.sciencedirect.com/science/book/9780124160071</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automatic defense against zero-day polymorphic worms in communication networks ent://SD_ILS/0/SD_ILS:286307 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Mohammed, Mohssen, 1982-&#160;Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466557284">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Moving Target Defense II Application of Game Theory and Adversarial Modeling ent://SD_ILS/0/SD_ILS:331766 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Jajodia, Sushil. editor.&#160;Ghosh, Anup K. editor.&#160;Subrahmanian, V.S. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.<br/>Preferred Shelf Number&#160;ONLINE(331766.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Indian Mujahideen Computational Analysis and Public Policy ent://SD_ILS/0/SD_ILS:332949 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Subrahmanian, V.S. author.&#160;Mannes, Aaron. author.&#160;Roul, Animesh. author.&#160;Raghavan, R.K. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332949.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02818-7">http://dx.doi.org/10.1007/978-3-319-02818-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Reconceptualizing deterrence nudging toward rationality in Middle Eastern rivalries ent://SD_ILS/0/SD_ILS:258597 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Lieberman, Elli, 1951-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203100370">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Oil sparks in the Amazon local conflicts, indigenous populations, and natural resources ent://SD_ILS/0/SD_ILS:277135 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Vasquez, Patricia I., author.&#160;Project Muse, distributor.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780820346380/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Norm dynamics in multilateral arms control interests, conflicts, and justice ent://SD_ILS/0/SD_ILS:240560 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;M&uuml;ller, Harald, 1949 May 13-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780820344249/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Containing Russia's nuclear firebirds harmony and change at the International Science and Technology Center ent://SD_ILS/0/SD_ILS:241279 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Schweitzer, Glenn E., 1930-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780820344713/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Anthropological Perspectives on Intangible Cultural Heritage ent://SD_ILS/0/SD_ILS:332809 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Arizpe, Lourdes. editor.&#160;Amescua, Cristina. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332809.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-00855-4">http://dx.doi.org/10.1007/978-3-319-00855-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global and Regional Approaches to Arms Control in the Middle East A Critical Assessment from the Arab World ent://SD_ILS/0/SD_ILS:333231 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Selim, Gamal M. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333231.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29314-6">http://dx.doi.org/10.1007/978-3-642-29314-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Interplay between Urban Development, Vulnerability, and Risk Management A Case Study of the Istanbul Metropolitan Area ent://SD_ILS/0/SD_ILS:333237 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Gencer, Ebru A. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333237.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29470-9">http://dx.doi.org/10.1007/978-3-642-29470-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> G&uuml;venlik &Ccedil;al&#305;&#351;malar&#305; Dergisi. ent://SD_ILS/0/SD_ILS:342920 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Format:&#160;Continuing Resources&#160;Other<br/>Availability&#160;~0<br/> &#304;&#351; Hukuku ve Sosyal G&uuml;venlik Hukuku Dergisi . ent://SD_ILS/0/SD_ILS:371749 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Format:&#160;Continuing Resources&#160;Other<br/>Availability&#160;~0<br/> Public key cryptography applications and attacks ent://SD_ILS/0/SD_ILS:249342 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Batten, Lynn Margaret.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480474">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480474</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Logics of war : explanations for limited and unlimited conflicts ent://SD_ILS/0/SD_ILS:377129 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Weisiger, Alex, 1977-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.jstor.org/stable/10.7591/j.ctt1xx5pk">http://www.jstor.org/stable/10.7591/j.ctt1xx5pk</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> New Materials for Thermoelectric Applications: Theory and Experiment ent://SD_ILS/0/SD_ILS:335864 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Zlatic, Veljko. editor.&#160;Hewson, Alex. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335864.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-4984-9">http://dx.doi.org/10.1007/978-94-007-4984-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Biopreparedness and Public Health Exploring Synergies ent://SD_ILS/0/SD_ILS:335935 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Hunger, Iris. editor.&#160;Radosavljevic, Vladan. editor.&#160;Belojevic, Goran. editor.&#160;Rotz, Lisa D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335935.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-5273-3">http://dx.doi.org/10.1007/978-94-007-5273-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Biophysics and Structure to Counter Threats and Challenges ent://SD_ILS/0/SD_ILS:335850 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Puglisi, Joseph D. editor.&#160;Margaris, Manolia V. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335850.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-4923-8">http://dx.doi.org/10.1007/978-94-007-4923-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Nano-Optics for Enhancing Light-Matter Interactions on a Molecular Scale Plasmonics, Photonic Materials and Sub-Wavelength Resolution ent://SD_ILS/0/SD_ILS:335945 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Di Bartolo, Baldassare. editor.&#160;Collins, John. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335945.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-5313-6">http://dx.doi.org/10.1007/978-94-007-5313-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Black Sea Energy Resource Development and Hydrogen Energy Problems ent://SD_ILS/0/SD_ILS:336177 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Veziro&#287;lu, Ayfer. editor.&#160;Tsitskishvili, Marat. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336177.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-6152-0">http://dx.doi.org/10.1007/978-94-007-6152-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advancing Methods for Biomolecular Crystallography ent://SD_ILS/0/SD_ILS:336196 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Read, Randy. editor.&#160;Urzhumtsev, Alexandre G. editor.&#160;Lunin, Vladimir Y. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336196.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-6232-9">http://dx.doi.org/10.1007/978-94-007-6232-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Bioactive Compounds Countering the Effects of Radiological, Chemical and Biological Agents Strategies to Counter Biological Damage ent://SD_ILS/0/SD_ILS:336257 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Pierce, Grant N. editor.&#160;Mizin, Volodymyr I. editor.&#160;Omelchenko, Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336257.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-6513-9">http://dx.doi.org/10.1007/978-94-007-6513-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Low-Dimensional Functional Materials ent://SD_ILS/0/SD_ILS:336286 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Egger, Reinhold. editor.&#160;Matrasulov, Davron. editor.&#160;Rakhimov, Khamdam. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336286.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-6618-1">http://dx.doi.org/10.1007/978-94-007-6618-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Advances in Broadband Dielectric Spectroscopy ent://SD_ILS/0/SD_ILS:335872 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Kalmykov, Yuri P. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335872.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-5012-8">http://dx.doi.org/10.1007/978-94-007-5012-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Disposal of Dangerous Chemicals in Urban Areas and Mega Cities Role of Oxides and Acids of Nitrogen in Atmospheric Chemistry ent://SD_ILS/0/SD_ILS:335876 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Barnes, Ian. editor.&#160;Rudzi&#324;ski, Krzysztof J. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335876.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-5034-0">http://dx.doi.org/10.1007/978-94-007-5034-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Economic Sustainability and Environmental Protection in Mediterranean Countries through Clean Manufacturing Methods ent://SD_ILS/0/SD_ILS:335882 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Coca-Prados, Jos&eacute;. editor.&#160;Guti&eacute;rrez-Cervell&oacute;, Gemma. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335882.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-5079-1">http://dx.doi.org/10.1007/978-94-007-5079-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet-based intelligence in public health emergencies early detection and response in disease outbreak crises ent://SD_ILS/0/SD_ILS:281399 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;NATO Advanced Research Workshop on Internet-Based Intelligence for Public Health Emergencies and Disease Outbreak: Technical, Medical and Regulatory Issues (2011 : Haifa, Israel)&#160;Mordini, E. (Emilio)&#160;Green, Manfred.&#160;IOS Press.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=578843">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=578843</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed power in the United States prospects and policies ent://SD_ILS/0/SD_ILS:281085 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Carl, Jeremy.&#160;Hoover Institution on War, Revolution, and Peace. Schultz-Stephenson Task Force on Energy Policy, sponsoring body.&#160;Brookings Institution. Energy Security Initiative, sponsoring body.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=564291">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=564291</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Polis bilimleri dergisi = Turkish journal of police studies ent://SD_ILS/0/SD_ILS:229319 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Electronic Access&#160;<a href="http://www.pa.edu.tr/?app=ED77B64B-C77A-47E1-89ED-FB78A53019E4">Elektronik Eri?im</a><br/>Format:&#160;Continuing Resources&#160;Other<br/>Availability&#160;~0<br/> The politics of land and food scarcity ent://SD_ILS/0/SD_ILS:259546 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;De Castro, Paolo, 1958-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203084137">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Road to Good Nutrition ent://SD_ILS/0/SD_ILS:276495 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Eggersdorfer,M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.karger.com/?ISBN=978-3-318-02549-1">http://www.karger.com/?ISBN=978-3-318-02549-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing the U.S.-Japan alliance ent://SD_ILS/0/SD_ILS:276686 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Auslin, Michael R., 1967-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781939131157/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Oil and gas for Asia geopolitical implications of Asia's rising demand ent://SD_ILS/0/SD_ILS:276687 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;National Bureau of Asian Research (U.S.)&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780981890463/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Maritime energy resources in Asia legal regimes and cooperation ent://SD_ILS/0/SD_ILS:276688 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Schofield, Clive.&#160;National Bureau of Asian Research (U.S.)&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780981890456/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seeds of resistance, seeds of hope place and agency in the conservation of biodiversity ent://SD_ILS/0/SD_ILS:277547 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Andrews-Swann, Jenna, 1980- editor of compilation.&#160;Rhoades, Robert E., editor of compilation.&#160;Nazarea, Virginia D. (Virginia Dimasuay), 1954- editor of compilation.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780816599073/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The last days of Kim Jong-il the North Korean threat in a changing era ent://SD_ILS/0/SD_ILS:277713 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Bechtol, Bruce E., 1959-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781612346120/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Asia's uncertain LNG future ent://SD_ILS/0/SD_ILS:277881 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;National Bureau of Asian Research (U.S.), issuing body.&#160;Project Muse, distributor.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781939131300/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Liberal terror ent://SD_ILS/0/SD_ILS:358851 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Evans, Brad.<br/>Preferred Shelf Number&#160;HV6431 E89 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Waiting for Jos&eacute; : the Minutemen's pursuit of America ent://SD_ILS/0/SD_ILS:377111 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Shapira, Harel, 1979-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.jstor.org/stable/10.2307/j.ctt24hq4p">http://www.jstor.org/stable/10.2307/j.ctt24hq4p</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secret history : the story of cryptology ent://SD_ILS/0/SD_ILS:365258 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Bauer, Craig P.<br/>Preferred Shelf Number&#160;QA76.9.A25 B384 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Azerbaycan cumhuriyeti'nin ulusal kalk&#305;nma ve g&uuml;venlik politikas&#305; ent://SD_ILS/0/SD_ILS:383604 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Hasanov, Ali M.<br/>Preferred Shelf Number&#160;UA853.A9 H37 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> The second Red Scare and the unmaking of the New Deal left ent://SD_ILS/0/SD_ILS:376868 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Storrs, Landon R. Y.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.jstor.org/stable/10.2307/j.cttq95d1">http://www.jstor.org/stable/10.2307/j.cttq95d1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sigorta prim te&#351;vikleri : son de&#287;i&#351;ikliklerle birlikte ent://SD_ILS/0/SD_ILS:388057 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;&Ouml;zcan, Celal.&#160;Demirci, Ey&uuml;p Sabri.<br/>Preferred Shelf Number&#160;KKX998 O93 2013<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks ent://SD_ILS/0/SD_ILS:332461 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Tang, Jin. author.&#160;Cheng, Yu. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332461.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-8996-2">http://dx.doi.org/10.1007/978-1-4614-8996-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Location Privacy Protection in Mobile Networks ent://SD_ILS/0/SD_ILS:332468 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Liu, Xinxin. author.&#160;Li, Xiaolin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332468.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Systems 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings ent://SD_ILS/0/SD_ILS:332976 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Bloem, Roderick. editor.&#160;Lipp, Peter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332976.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-03491-1">http://dx.doi.org/10.1007/978-3-319-03491-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; INDOCRYPT 2013 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings ent://SD_ILS/0/SD_ILS:332978 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Paul, Goutam. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332978.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-03515-4">http://dx.doi.org/10.1007/978-3-319-03515-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Infrared Thermography for Thermo-Fluid-Dynamics ent://SD_ILS/0/SD_ILS:333242 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Astarita, Tommaso. author.&#160;Carlomagno, Giovanni Maria. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333242.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29508-9">http://dx.doi.org/10.1007/978-3-642-29508-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Computational Science XVII ent://SD_ILS/0/SD_ILS:334063 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Gavrilova, Marina L. editor.&#160;Tan, C. J. Kenneth. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334063.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35840-1">http://dx.doi.org/10.1007/978-3-642-35840-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334097 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Knudsen, Lars R. editor.&#160;Wu, Huapeng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334097.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35999-6">http://dx.doi.org/10.1007/978-3-642-35999-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology &ndash; CT-RSA 2013 The Cryptographers&rsquo; Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334122 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Dawson, Ed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334122.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36095-4">http://dx.doi.org/10.1007/978-3-642-36095-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Computing and Services International Conference, ISCTCS 2012, Beijing, China, May 28 &ndash; June 2, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334049 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Yuan, Yuyu. editor.&#160;Wu, Xu. editor.&#160;Lu, Yueming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334049.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35795-4">http://dx.doi.org/10.1007/978-3-642-35795-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography &ndash; Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334179 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Abdalla, Michel. editor.&#160;Lange, Tanja. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334179.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36334-4">http://dx.doi.org/10.1007/978-3-642-36334-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Policies and Research in Identity Management Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334399 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Leeuw, Elisabeth. editor.&#160;Mitchell, Chris. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334399.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37282-7">http://dx.doi.org/10.1007/978-3-642-37282-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334401 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Mangard, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334401.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37288-9">http://dx.doi.org/10.1007/978-3-642-37288-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334403 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Flegel, Ulrich. editor.&#160;Markatos, Evangelos. editor.&#160;Robertson, William. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334403.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37300-8">http://dx.doi.org/10.1007/978-3-642-37300-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2013 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334587 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Johansson, Thomas. editor.&#160;Nguyen, Phong Q. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334587.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38348-9">http://dx.doi.org/10.1007/978-3-642-38348-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection VII 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335209 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Butts, Jonathan. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335209.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45330-4">http://dx.doi.org/10.1007/978-3-642-45330-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Physically Unclonable Functions Constructions, Properties and Applications ent://SD_ILS/0/SD_ILS:335102 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Maes, Roel. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335102.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41395-7">http://dx.doi.org/10.1007/978-3-642-41395-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet and Distributed Computing Systems 6th International Conference, IDCS 2013, Hangzhou, China, October 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:335105 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Pathan, Mukaddim. editor.&#160;Wei, Guiyi. editor.&#160;Fortino, Giancarlo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335105.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41428-2">http://dx.doi.org/10.1007/978-3-642-41428-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings ent://SD_ILS/0/SD_ILS:335111 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Riis Nielson, Hanne. editor.&#160;Gollmann, Dieter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335111.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41488-6">http://dx.doi.org/10.1007/978-3-642-41488-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing cloud and mobility a practitioner's guide ent://SD_ILS/0/SD_ILS:342839 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Lim, Ian.&#160;Hourani, Paul.&#160;Coolidge, E. Coleen.<br/>Preferred Shelf Number&#160;ONLINE(342839.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466550827">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> New directions of modern cryptography ent://SD_ILS/0/SD_ILS:344263 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Cao, Zhenfu.<br/>Preferred Shelf Number&#160;ONLINE(344263.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466501409">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Private international law in Commonwealth Africa ent://SD_ILS/0/SD_ILS:506357 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Oppong, Richard Frimpong, 1978- author.<br/>Preferred Shelf Number&#160;KQC126 .O67 2013<br/>Electronic Access&#160;<a href="https://doi.org/10.1017/CBO9781139031288">https://doi.org/10.1017/CBO9781139031288</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334635 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Gaborit, Philippe. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334635.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38616-9">http://dx.doi.org/10.1007/978-3-642-38616-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334760 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Rieck, Konrad. editor.&#160;Stewin, Patrick. editor.&#160;Seifert, Jean-Pierre. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334760.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39235-1">http://dx.doi.org/10.1007/978-3-642-39235-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Enhancing Technologies 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334726 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Cristofaro, Emiliano. editor.&#160;Wright, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334726.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39077-7">http://dx.doi.org/10.1007/978-3-642-39077-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Voting and Identify 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334746 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Heather, James. editor.&#160;Schneider, Steve. editor.&#160;Teague, Vanessa. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334746.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39185-9">http://dx.doi.org/10.1007/978-3-642-39185-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Interactive Theorem Proving 4th International Conference, ITP 2013, Rennes, France, July 22-26, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334825 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Blazy, Sandrine. editor.&#160;Paulin-Mohring, Christine. editor.&#160;Pichardie, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334825.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39634-2">http://dx.doi.org/10.1007/978-3-642-39634-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Cyber Crime 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334864 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Rogers, Marcus. editor.&#160;Seigfried-Spellar, Kathryn C. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334864.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39891-9">http://dx.doi.org/10.1007/978-3-642-39891-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Infrastructures, Services and Applications 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334878 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Capitani di Vimercati, Sabrina. editor.&#160;Mitchell, Chris. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334878.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40012-4">http://dx.doi.org/10.1007/978-3-642-40012-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructive Side-Channel Analysis and Secure Design 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334880 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Prouff, Emmanuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334880.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40026-1">http://dx.doi.org/10.1007/978-3-642-40026-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; CRYPTO 2013 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I ent://SD_ILS/0/SD_ILS:334881 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Canetti, Ran. editor.&#160;Garay, Juan A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334881.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40041-4">http://dx.doi.org/10.1007/978-3-642-40041-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; CRYPTO 2013 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II ent://SD_ILS/0/SD_ILS:334888 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Canetti, Ran. editor.&#160;Garay, Juan A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334888.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40084-1">http://dx.doi.org/10.1007/978-3-642-40084-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Watermaking 11th International Workshop, IWDW 2012, Shanghai, China, October 31 &ndash; November 3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334892 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Shi, Yun Q. editor.&#160;Kim, Hyoung-Joong. editor.&#160;P&eacute;rez-Gonz&aacute;lez, Fernando. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334892.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40099-5">http://dx.doi.org/10.1007/978-3-642-40099-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Hardware and Embedded Systems - CHES 2013 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334932 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Bertoni, Guido. editor.&#160;Coron, Jean-S&eacute;bastien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334932.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40349-1">http://dx.doi.org/10.1007/978-3-642-40349-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Communication Networking 19th EUNICE/IFIP WG 6.6 International Workshop, Chemnitz, Germany, August 28-30, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334966 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Bauschert, Thomas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334966.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40552-5">http://dx.doi.org/10.1007/978-3-642-40552-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Service-Oriented and Cloud Computing Second European Conference, ESOCC 2013, M&aacute;laga, Spain, September 11-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334983 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Lau, Kung-Kiu. editor.&#160;Lamersdorf, Winfried. editor.&#160;Pimentel, Ernesto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334983.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40651-5">http://dx.doi.org/10.1007/978-3-642-40651-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Public Key Infrastructures ent://SD_ILS/0/SD_ILS:334984 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Buchmann, Johannes A. author.&#160;Karatsiolis, Evangelos. author.&#160;Wiesmaier, Alexander. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334984.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40657-7">http://dx.doi.org/10.1007/978-3-642-40657-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> On the Move to Meaningful Internet Systems: OTM 2013 Conferences Confederated International Conferences: CoopIS, DOA-Trusted Cloud, and ODBASE 2013, Graz, Austria, September 9-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335044 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Meersman, Robert. editor.&#160;Panetto, Herv&eacute;. editor.&#160;Dillon, Tharam. editor.&#160;Eder, Johann. editor.&#160;Bellahsene, Zohra. editor.<br/>Preferred Shelf Number&#160;ONLINE(335044.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41030-7">http://dx.doi.org/10.1007/978-3-642-41030-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Frontiers in Internet Technologies Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335225 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Su, Jinshu. editor.&#160;Zhao, Baokang. editor.&#160;Sun, Zhigang. editor.&#160;Wang, Xiaofeng. editor.&#160;Wang, Fei. editor.<br/>Preferred Shelf Number&#160;ONLINE(335225.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-53959-6">http://dx.doi.org/10.1007/978-3-642-53959-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Asian Space Race: Rhetoric or Reality? ent://SD_ILS/0/SD_ILS:335452 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Lele, Ajey. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335452.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-81-322-0733-7">http://dx.doi.org/10.1007/978-81-322-0733-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Uluslararas&#305; ili&#351;kiler teorileri : &Ccedil;at&#305;&#351;ma, hegemonya, i&#351;birli&#287;i ent://SD_ILS/0/SD_ILS:359894 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Ar&#305;, Tayyar.<br/>Preferred Shelf Number&#160;JZ1310 A76 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Prevention, pre-emption and the nuclear option : from Bush to Obama ent://SD_ILS/0/SD_ILS:365117 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Warren, Aiden.<br/>Preferred Shelf Number&#160;JZ1480 W39 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Post-disaster reconstruction and change communities' perspectives ent://SD_ILS/0/SD_ILS:285294 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Duyne Barenstein, Jennifer E.&#160;Leemann, Esther.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439888179">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Game theory in communication networks cooperative resolution of interactive networking scenarios ent://SD_ILS/0/SD_ILS:286243 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Antoniou, Josephina.&#160;Pitsillides, A. (Andreas)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439848104">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital forensics for handheld devices ent://SD_ILS/0/SD_ILS:286248 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Doherty, Eamon P.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439898789">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook on mobile and ubiquitous computing status and perspective ent://SD_ILS/0/SD_ILS:286262 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Yang, Laurence Tianruo.&#160;Syukur, Evi.&#160;Loke, Seng.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439848128">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bring your own devices (BYOD) survival guide ent://SD_ILS/0/SD_ILS:286311 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Keyes, Jessica, 1950-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466565043">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fundamentals in modeling and control of mobile manipulators ent://SD_ILS/0/SD_ILS:287272 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Li, Zhijun, 1973-&#160;Ge, Shuzhi Sam.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466580428">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Water, agriculture and the environment in Spain can we square the circle? ent://SD_ILS/0/SD_ILS:287299 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;De Stefano, Lucia.&#160;Llamas, Manuel Ramn&#804;.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203096123">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Official (ISC)[superscript 2] guide to the CAP CBK ent://SD_ILS/0/SD_ILS:288056 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Howard, Patrick D.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439820766">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud enterprise architecture ent://SD_ILS/0/SD_ILS:288146 2025-02-27T03:05:05Z 2025-02-27T03:05:05Z Author&#160;Raj, Pethuru.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466502338">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>